answer scheme mid year ict form 4 section a name ic no form question no candidate’s answer skor 1 b

ANSWER SCHEME
MID YEAR ICT FORM 4
SECTION A
NAME
IC NO
Form
Question No
Candidate’s Answer
Skor
1
B
1
2
B
2
3
True
3
4
i)
Hand Geometry Scanning
4
ii)
Facial Recognition
5
5
D
6
6
B
7
7
D
8
8
i)
B
9
ii)
D
10
iii)
C
11
9
True
12
10
D
13
11
i)
False
14
ii)
True
15
12
i)
220 or 1048576 (choose either one only)
16
ii)
Bit
17
13
i)
A
18
ii)
B
19
iii)
D
20
14
C
21
15
B
22
16
i)
D
23
ii)
C
24
iii)
A
25
17
C
26
18
False
27
19
Blue-ray disc
28
20
False
29
21
C
30
22
Managing data and programs
31
23
i)
K
32
ii)
L
33
iii)
N
34
24
A
35
25
B
36
TOTAL MARKS
QUES
NO
QUESTIONS
ANSWER
SCORES
26
a.
Based on statement above, list TWO controversial contents from the
impact of ICT on society.
Pornography
1 m
1 m
Slander
b.
State TWO impacts of one controversial contents in (a) to Malaysian
society.
Pornography
Can lead criminal acts
1 m
1 m
1 m
1 m
Can lead sexual addiction/Can lead sexual addiction/perversion
Can develop low moral value towards other man, women, children
Can erode good religious, cultural and social beliefs and behaviour
OR
Slander
Can develop into society that disregards honesty and truth.
Can develop bad habit of spreading untruths and rumours
Can lead to unnecessary argument
Can cause people to have negative attitudes towards another person
(choose either TWO impacts from Pornography OR TWO impact from
Slander. One answer carry ONE mark)
27
a.
Name and explain the type of computer crime that Shen has committed.
Copyright Infringement.
1 m
Involves illegal copy or reproduction of copyrights materials by the
black market group
1 m
b.
What was happened to Shen’s computer? How can Shen prevent his
computer from the problem?
Computer virus.
1 m
Install anti-virus software/ scan files for viruses before
downloading.
1 m
28
a.
Describe why does Mohan encrypt the report?
To secure the information
1 m
To make sure only the authorized person can read the information
1 m
b.
What is the term given to the encrypted text in the report?
Encryption key and decryption key
1 m
Cipher text
1 m
29
a.
What is R? Explain the function of R?
Output.
1 m
Output is data that has been processed into a useful form called
information
1 m
b.
R have four types. State TWO types of R.
Texts, graphics, audio, video
2 m
(choose any two answer)
30
a.
Name types of user interface for X and Y.
X- Command line
1 m
Y- Graphical User Interface
1 m
b.
State TWO differences between X and Y.
X
Y
User have to memories all the syntax to issues command
User have not to memories all the syntax to issue command
Difficult to use
Easy to use.
Not user friendly
User friendly.
(choose two differences ONLY and compare the answer in same aspect )
1 m
1 m
1 m
31
a.
Proposed ONE of the latest technology that can be use by Cikgu Rose to
conduct her lesson although she is attending the course.
Video conferencing or Voice Over Internet Protocol (VOIP) or any
related answer
1 m
ability to meet with people in remote locations without incurring
travel expenses or other expenses associated with face to face
communication
1 m
easily accessed and contacted using video conferencing
1 m
can stimulate better brainstorming, knowledge sharing and information
gathering
( or any related answers)
1 m
b.
Identify TWO input devices and ONE output device that you justify in
(a).
Input devices : Web cam, microphone
2 m
Output devices : Speaker, monitor
(choose either one for output devices)
1 m
32
a.
Name X, Y, and Z
X: Mobile users
1 m
Y: SOHO users
1 m
Z: Power users
1 m
b.
Explain how users in Y works.
i)
use desktop or notebook computers as well as telephone, hand phones
and PDAs in completing their tasks and communicating
1 m
ii)
work in a small company or work as an individual at home
1 m
iii)
They advertise their products and services through websites
1 m
iv)
SOHO also have their own basic business software such as word
processing and spreadsheet software to assist them in documents
preparation and their financial tasks.
1 m
33
a.
Explain the TWO function of ASCII and describe the ASCII working
process in the computer system.
Function of ASCII
ASCII was established to achieve compatibility between various types
of data processing equipment making it possible for the components to
communicate with each other successfully.
1 m
ASCII enables manufactures to produce components that are assured to
operate correctly in a computer.
1 m
ASCII working process:
Every character is converted to its corresponding binary form. The
computer processes the letter as a byte, which actually a series of on
and off of electrical states. When the computer is finished processing
the byte, the software installed in the system convert the byte back
which is then displayed in the screen.
2 m
b.
Explain the relationship of data representation for bit, byte and
character.
A bit is the smallest unit of data and represented by the number 1 and
0.
Byte is a unit of information built from bits. One byte equals to 8
bits.
One byte represents one character such as A,7,9 and +
1 m
1 m
1 m

  • GENERAL MEETING THE MINUTES OF THE GENERAL MEETING HELD
  • CONCURSO N°326 BASES CONCURSO INTERNOEXTERNO PARA LA PROVISIÓN DE
  • CAPACITACIÓN DE DIRIGENTES 2011 LAS DIACONISAS LAS DIACONISAS ESTABAN
  • BŪVDARBU LĪGUMS 20 GADA VIENOTAIS
  • OVERZICHT JAAR 1968 2000 REISVERSLAGEN EN FOTO’S
  • MS WORD’I TÖÖ NR 3 KORDAMINE PK 1
  • THEMA ZIEK EN GEZOND THEMALESSEN VOOR 812 JARIGEN THEMA
  • JEDILNIKJULIJ DAN ZAJTRK KOSILO POP MALICA 17 PON MEŠANI
  • PAPER PRESENTED AT EDMEDIA WORLD CONFERENCE ON MULTIMEDIA HYPERMEDIA
  • P REOFFER CANDIDATE INFORMATION RELEASE AUTHORIZATION AS A CANDIDATE
  • PRIJEDLOG NA TEMELJU ČLANKA 104 STAVKA 1 TOČKA 1
  • CONCURSO INICIATIVA CAMPUS EMPRENDEDOR EDICIÓN 2015 ANEXO 4 RESUMEN
  • G 8 ZP T 20
  • GOMACTech%20Session_Urban
  • Spitalul DE Psihiatrie “elisabeta Doamna” Galati Organizează Concurs în
  • TLM R1 REPORT SUSPECTED CANDIDATE MALPRACTICE CONFIDENTIAL THIS FORM
  • A TOTAL FEE RECEIPT MEETING DATE
  • 1 E XTRACT FROM A LONG WALK TO FREEDOM
  • ROZPIS NA 48 TÝDEN (OD 28 11 DO 5
  • THE 22ND MEETING OF THE ASEAN SENIOR OFFICIALS ON
  • LAMPIRAN I FORMAT STANDARD KERTAS PROPOSAL PENAWARAN KURSUS ELEKTIF
  • THE SALE OF GOODS ACT 1930 (ACT NO
  • CONNECTICUT DEPARTMENT OF SOCIAL SERVICES UNIFORM POLICY MANUAL
  • ESCANDINAVIA Y PERLAS DEL BÁLTICO 15 DÍAS
  • COMPAÑÍA DE MINAS BUENAVENTURA SAA INFORMACIÓN FINANCIERA INTERINA NO
  • MULTIPLE CHOICE QUESTIONS (MCQ) TOPIC QUIZ ENZYMES
  • 06 PROCESADORES DE TEXTO I T ECNORRASCACIELOS ¿EL
  • ZAŁĄCZNIK NR 1 DO ZAPYTANIA OFERTOWEGO NAZWA ORAZ DANE
  • ZÁKLADNÍ ŠKOLA ÚSTÍ NAD ORLICÍ KOMENSKÉHO 11 PRAVIDLA PRO
  • 5 1 SPRENDIMO „DĖL ŠILUTĖS RAJONO SAVIVALDYBĖS KONTROLIERIAUS PAREIGYBĖS